Descibe the abusive behaviour that you have recorded here (keep the technical logs for the next section) *

Copy and paste technical details of the abuse, including access logs to application or system services (ssh, apache, ...) or the entire email including headers in the case of spam. This information may be transmitted to the customer who is the subject of the complaint. *